Thu.Oct 27, 2022

article thumbnail

How Newcomp Analytics partners with IBM to advance clients’ supply chain insights

IBM Big Data Hub

When Newcomp Analytics started working with chocolatier Lindt Canada more than 15 years ago to support their supply chain, Lindt had no full-time IT personnel for analytics. Lindt now has a team of 10, including a business intelligence (BI) manager and BI developer analysts. Yet Newcomp continues to be an essential and trusted partner, helping the company keep up with the high volume of analytics solutions it needs to address.

article thumbnail

Chinese Disinfo Campaign Targeting US Midterm Elections

Data Breach Today

'Dragonbridge' Spreads Anti-Voting Message, Impersonates Cybersecurity Researchers A Chinese disinformation campaign seeks to dissuade U.S. voters from participating in the November midterm elections, finds research from Mandiant. The campaign, nicknamed Dragonbridge, also likely impersonated researches unmasking Chinese threat actors.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Future of Human Intelligence: A Conversation with Ray Kurzweil

OpenText Information Management

Information is at the core of being human, the universe and evolution itself. Information creation is accelerating, and its use is transformative in nature. Machines generate more information than humans today. Machines share their knowledge instantly and understand the nuances of language. One day, machines will directly enhance the human mind, and allow each human … The post The Future of Human Intelligence: A Conversation with Ray Kurzweil appeared first on OpenText Blogs.

IT 140
article thumbnail

Feds Urge Healthcare Entities to Train for Incident Response

Data Breach Today

Plans Should Emphasize Rehearsing Various Hacking, Breach Scenarios Healthcare entities need to rehearse breach response playbooks to avoid paying fines to the Department of Health and Human Services for poor incident response after a severe breach. Well-tested security incident response plans ensure the security of patient data, says the HHS Office of Civil Rights.

Security 130
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

ISO 27001:2022 Has Been Released – What Does It Mean for Your Organisation?

IT Governance

A new version of ISO 27001 was published this week, introducing several significant changes in the way organisations are expected to manage information security. The Standard was last revised almost a decade ago (although a new iteration of the supplementary standard ISO 27002 was published in February 2022), meaning that the release of ISO 27001:2022 has been much needed and highly anticipated.

IT 119

More Trending

article thumbnail

IT Governance Podcast Episode 11: EU-US Data Privacy Framework, Ransomware & Cyber Detection

IT Governance

This week, we discuss the new mechanism for transferring EU residents’ personal data to the US, the first GDPR Data Protection Seal, a new ransomware attack targeting Ukraine and its allies, and the first layer in a defence-in-depth approach to cyber security: detection. Now available on Spotify , Amazon Music , Apple Podcasts and SoundCloud. The post IT Governance Podcast Episode 11: EU-US Data Privacy Framework, Ransomware & Cyber Detection appeared first on IT Governance UK Blog.

article thumbnail

Forescout CEO Wael Mohamed to Exit as Firm Lays off Workers

Data Breach Today

Mohamed's Departure Means the IoT Scurity Firm Will Get Its 4th CEO Since Fall 2020 Forescout will get its fourth CEO since September 2020 as the IoT security firm lays off an unspecified numbers of employees. Wael Mohamed will exit day-to-day management after just 19 months in the top role in a tenure punctuated by the acquisitions of CyberMDX and Cysiv.

IoT 130
article thumbnail

Thomson Reuters collected and leaked at least 3TB of sensitive data

Security Affairs

The multinational media conglomerate Thomson Reuters left a database with sensitive customer and corporate data exposed online. Original post at [link]. Thomson Reuters, a multinational media conglomerate, left an open database with sensitive customer and corporate data, including third-party server passwords in plaintext format. Attackers could use the details for a supply-chain attack.

IoT 114
article thumbnail

Tools to Reduce Authorized Payment Fraud and Scams

Data Breach Today

Banking Researcher Ken Palla Shares New Report on Controlling Zelle Scams Since Zelle fraud has increased 109% in the United States, the banking industry is struggling to reduce authorized push payment scams. Ken Palla, former director at Union Bank, shares tips for combating fraudsters, including delays on large transactions, education and behavioral analytics.

Analytics 130
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How CyBOK Can Help You Develop Your Cyber Security Career

IT Governance

The (ISC)² 2022 Cybersecurity Workforce Study reported that 3.4 million more workers are required to meet the global cyber security skills gap. This is a huge employment opportunity, but do you know what knowledge and skills you need to develop your career as a cyber security professional? Given the complexity of cyber security, it’s not surprising that UK cyber security professionals have a bewildering range of job titles and responsibilities.

Security 105
article thumbnail

Versa Networks Raises $120M to Boost Cloud, Campus Products

Data Breach Today

Versa Will Use the Pre-IPO Money to Help Guard the Cloud and Bring ZTNA to Campuses Versa Networks has completed a pre-IPO funding round to build out a cloud security portfolio and bring zero trust functionality to campus and branch settings. The SASE vendor says the $120 million Series E round will allow the company to build or buy technology around SSPM, CSPM and CWPP.

Cloud 130
article thumbnail

SiriSpy flaw allows eavesdropping on users’ conversations with Siri

Security Affairs

SiriSpy is a vulnerability affecting Apple iOS and macOS that allowed apps to eavesdrop on users’ conversations with Siri. SiriSpy is a now-patched vulnerability, tracked as CVE-2022-32946, in Apple’s iOS and macOS that could have potentially allowed any app with access to Bluetooth to eavesdrop on conversations with Siri and audio. “An app may be able to record audio using a pair of connected AirPods.” reads the advisory published by Apple. “This issue was addresse

Access 99
article thumbnail

Stolen Devices and Phishing

KnowBe4

Researchers at Cyren describe a phishing attack that resulted from the theft of a stolen iPad. The iPad was stolen on a train in Switzerland, and briefly appeared on Apple’s location services in Paris a few days later. The owner assumed the iPad was lost for good, but sent a message to the iPad with her phone number just in case.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Raspberry Robin operators are selling initial access to compromised enterprise networks to ransomware gangs

Security Affairs

DEV-0950 group used Clop ransomware to encrypt the network of organizations previously infected with the Raspberry Robin worm. Microsoft has discovered recent activity that links the Raspberry Robin worm to human-operated ransomware attacks. . Data collected by Microsoft Defender for Endpoint shows that nearly 3,000 devices in almost 1,000 organizations have seen at least one RaspberryRobin payload-related alert in the last 30 days.

article thumbnail

FTC Takes Action Against Drizly and its CEO for Alleged Security Failures that Exposed Data of 2.5 Million Consumers

Hunton Privacy

On October 24, 2022, the Federal Trade Commission announced a proposed consent order with Drizly, an online alcohol ordering and delivery service, and the company’s CEO, for the alleged failure to maintain appropriate security safeguards that led to a data breach that affected 2.5 million consumers’ personal information. In the FTC’s complaint , the agency alleged that Drizly failed to use appropriate information security practices to protect consumers’ personal information, which led to a malic

article thumbnail

Climbing the world’s tallest mountain: Energy sustainability

OpenText Information Management

Hello from Alaska! I recently returned from an invigorating and inspiring OpenText World in Las Vegas earlier in October. Coming back to Alaska, I was met with a beautiful view: snow on the Chugach Mountains surrounding the Anchorage area. Looking at the snow-covered mountains, I couldn’t help but think of what our guest keynote speaker … The post Climbing the world’s tallest mountain: Energy sustainability appeared first on OpenText Blogs.

63
article thumbnail

Olá do Reltio Portugal! Introducing Reltio's new technology hub in Europe

Reltio

Reltio's rapid growth continues to bring us to new and exciting places, which is why I am excited to announce that we've opened a new office in Lisbon, Portugal. Lisbon will serve as a global Reltio hub along with Redwood Shores and Bangalore. As a global, distributed workforce, we're no strangers to locations far and wide. We've been a global company since I launched the startup in Redwood Shores, Calif., 11 years ago.

MDM 52
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cut the noise. Cue the results.

OpenText Information Management

If you faced a worker shortage, wouldn’t it make sense to optimize the time of the employees you do have? According to the latest report by the World Economic Forum1, the gap between supply and demand for cybersecurity professionals around the world stands at three million people. While optimists might point to a decline in … The post Cut the noise.

article thumbnail

Apple Managed Device Attestation and Jamf

Jamf

Apple introduced Managed Device Attestation at WWDC 2022, now available in OS 16. How will it increase the security of device deployments? What does it mean for the industry? And what does it mean for Apple admins?

article thumbnail

Maximize the Relationship Between Information Governance and Ediscovery

Zapproved

The mandate of corporate legal—protect brand reputation, control risk, ensure compliance—has run up against some hard realities as the nature of business evolves, especially when it comes to ediscovery. There’s no need to cite chapter and verse on the data-volume statistics: it’s clear that the same digital transformation fueling business growth also creates an explosion […].

article thumbnail

Global uncertainty underlines the need to accelerate modernization in transport and logistics

CGI

New market realities are pushing transport organizations to reassess what they must do to stay relevant in the future. As part of the 2022 CGI Voice of Our Clients (VOC), we spoke one-to-one with 84 transport and logistics executives to understand how they are evolving their priorities to move forward. This blog highlights the key findings from the discussions.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

7 Ways DocuWare Cloud Empowers You to Ace Compliance

Docuware

In 2023, data privacy concerns will intensify, and regulatory requirements will follow suit. New state privacy laws that will go into effect in 2023 include California Privacy Rights Act; Virginia Consumer Data Protection Act (VCDPA); Colorado Privacy Act (CPA) and Connecticut Act Concerning Personal Data Privacy and Online Monitoring (CTDPA). The General Data Protection Regulation (GDPR) which protects the data of members of the European Union (EU) still has a global impact because it applies t

article thumbnail

Gimmal Partners with Access to Integrate Virgo’s Powerful Retention and Privacy Compliance Capabilities with its Records and Information Governance Solution via Yahoo!Finance

IG Guru

Check out the link here.

article thumbnail

Meet Our Mayhem Heroes: Vishnu Prateek Kakaraparthi

ForAllSecure

As part of the Mayhem Heroes program , ForAllSecure visited various university campuses in the Spring of 2022. At the end of April, ForAllSecure hosted a day-long hackathon at Arizona State University where 181 students participated in the in-person training program followed by an online training held soon after. Over the next several weeks, the combined groups of ASU students contributed over 300 GitHub Open Source Software integrations for our Mayhem Heroes program.

Access 40
article thumbnail

Patent Drawings from Beyond the Grave

Unwritten Record

With Halloween just around the corner (at last!), I thought our readers would enjoy a little something spooky to get in the spirit. or perhaps to get in touch with the spirit. Automatic writing, or psychography, as a means of communicating with the spirit world has been in use for almost a thousand years. However, its place in the collective consciousness would not be formed until the late 19th and early 20th centuries, when the infamous Ouija Board entered the scene in American spiritualist com

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Big Changes are Afoot: Expanding and Enhancing the Have I Been Pwned API

Troy Hunt

Just over 3 years ago now, I sat down at a makeshift desk (ok, so it was a kitchen table) in an Airbnb in Olso and built the authenticated API for Have I Been Pwned (HIBP). As I explained at the time, the primary goal was to combat abuse of the service and by adding the need to supply a credit card, my theory was that the bad guys would be very reluctant to, well, be bad guys.

article thumbnail

New Version of Fodcha DDoS Botnet Adds Extortion

eSecurity Planet

Back in April of this year, 360 Netlab researchers reported on a new DDoS botnet with more than 10,000 daily active bots and over 100 DDoS victims per day, dubbed Fodcha due to its command and control (C2) domain name folded.in and its use of the ChaCha encryption algorithm. In response to 360 Netlab’s report, the author appeared to concede defeat by leaving the phrase “Netlab pls leave me alone I surrender” in a sample.

article thumbnail

How Data Quality can Affect Business Processes

Reltio

How Data Quality Affects Business Processes. Business processes and data quality go hand-in-hand. Any time you access, share, enter, or update data that relates to a business process, you’re using data. . But what if your business processes are relying on poor data? If your data isn’t reliable, the work you do based on it will be inefficient and misguided.

MDM 52